ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Application Security Research

  • Phishing in the Age of SaaS

    Sponsored by: SonicWall

    Phishing attacks have become the primary hacking method used against organizations. While the roots of the attack trace back to the beginning of email adoption, the proliferation of SaaS has led to a resurgence in this hacking method. In this white paper, learn how SonicWall Cloud App Security can help you defend against SaaS phishing attacks.

  • How to Automate an API Security Program

    Sponsored by: Data Theorem

    Join Doug Dooley, COO at Data Theorem, as he discusses the need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data.

  • The Golden State Warriors Case Study: Leading on the Court and in Social Media

    Sponsored by: Proofpoint

    As the Golden State Warriors' social media pages became more popular, bad actors were attracted to the large audiences. They began posting malware, phishing scams and spam to their pages. In this case study, learn how the Warriors were able to manage this malicious behavior by bringing in Proofpoint's Nexgate team.

  • 2019 SonicWall Cyberthreat Report

    Sponsored by: SonicWall

    Even for organizations, businesses and governments, a cyberattack is personal. At its very core, they strip these establishments and employees of their identities, privacy, reputation and monetary assets. In SonicWall's 2019 SonicWall Cyber Threat Report, explore key advancements in the threat landscape.

  • Interview: The People Factor: Fight Back Against Phishing

    Sponsored by: Proofpoint

    Phishing remains the top attack vector used by cybercriminals and every end user is a potential target. But with the right security awareness training, these same people can be a key component in your anti-phishing defense. In this webcast, Kurt Wescoe, Chief Architect at Wombat Security shares his insights on preventing phishing attacks.

  • Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up

    Sponsored by: Trend Micro, Inc.

    Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.

  • Why CASB Alone Isn't Enough

    Sponsored by: Open Systems Technologies

    Download this white paper to learn about the benefits of a complete web protection platform and why a CASB is no longer enough.

  • Cloud in the Crosshairs

    Sponsored by: NetScout Systems, Inc.

    In 2018, enterprises continued to wrestle with challenges such as ransomware, insider threats, and DDoS attacks, all while struggling to simplify operations. In this research report, explore key findings from NETSCOUT's 14th annual worldwide infrastructure security report.

  • Dawn of the Terrorbit Era

    Sponsored by: NetScout Systems, Inc.

    The global cyberthreat landscape continues to evolve, unleashing increasingly sophisticated and persistent attack techniques at internet scale. In this NETSCOUT Threat Intelligence report, explore key findings.

  • Introducing The F5 Advanced WAF

    Sponsored by: F5 Networks

    The F5 Advanced Web Application Firewall (WAF) provides a set of security features that can help keep your Web Applications safe from attack. In this webcast, John Wagnon, Senior Solution Developer at DevCentral, outlines many of the key features offered in the F5 Advanced WAF.

  • What is a Web Application Firewall (WAF)?

    Sponsored by: F5 Networks

    Today, threat vectors are being introduced at all layers of the network. Therefore, it's important to defend your network with more than just a traditional firewall. That's where a Web Application Firewall (WAF) comes in. In this webcast, John Wagnon from DevCentral, outlines what a WAF is and why your web application needs one.

  • IDC MarketScape: Worldwide DDoS Prevention Solutions 2019 Vendor Assessment

    Sponsored by: NetScout Systems, Inc.

    Distributed denial-of-service (DDoS) attacks are increasingly complex. Even though DDoS prevention technologies are more mainstream than a few years ago, choosing the right vendor or service is challenging. In this research report, explore an assessment of providers offering DDoS prevention and mitigation technologies and services.

  • F5 Advanced WAF

    Sponsored by: F5 Networks

    Attackers have embraced the use of automation to scan applications for vulnerabilities, attack account credentials, or cause denial of service (DoS). However, web application firewalls (WAF) can protect your applications from data breaches. In this resource, learn how F5 Advanced WAF can help you defend against attacks.

  • Exploring the Past, Present, And Future of Blockchain Technology

    Sponsored by: Armor

    Since its early applications in cryptocurrency, blockchain implementations have focused on keeping data secure. But the journey of blockchain technology now stretches beyond Bitcoin. For businesses, blockchain implementations can provide a secure way to store and track transactions. In this white paper, learn more about blockchain technology.

  • Security Report for In-Production Web Applications

    Sponsored by: Rapid7

    This report was designed to uncover new areas of risk in application security, and confirm the presence of threats, vulnerabilities, and security incidents that teams have previously only suspected. Download the report to explore the top 5 most common application security incidents including cross-site scripting, SQL injections and more.

  • F5 Advanced WAF: Your Defense Against Modern Threats

    Sponsored by: F5 Networks

    In this resource, learn about an advanced WAF technology that has the capabilities necessary to combat the evolving threats seen in the application security landscape today.

  • Secure Web Gateways: Voice of the Customer

    Sponsored by: Cisco Umbrella

    See how customers rate secure web gateway vendors such as Cisco, Forcepoint, McAfee, Symantec and Zscaler to assist you in your buying decision.

  • Armor Monitored Web Application Firewall

    Sponsored by: Armor

    In this resource, learn about the Armor monitored WAF and how it gives you control over which traffic to allow or block to your web applications by defining customizable web security rules to stop OWASP Top 10 application attacks including SQL injections (SQLi), XML external entity (XXE) attacks, and cross-site scripting (XSS) attacks.

  • Bust Threats or Risk Getting Busted

    Sponsored by: Cisco Umbrella

    In this webcast, learn the latest trends on top threats and best practices you can use to protect against threats in your organization. The webcast also reviews steps you can take to improve your threat detection, prevention and remediation efforts.

  • Malicious Cryptominers are Eyeing Your Resources.

    Sponsored by: Cisco Umbrella

    Malicious cryptominers tap into an organization's computing power in order to create cryptocurrencies and generate profit for themselves. If your organization is protected, it can cost you in many ways. In this white paper, learn how to protect your organization using Cisco Umbrella as your first line of defense.

  • Protect Your Organization From Unwanted Cryptomining

    Sponsored by: Cisco Umbrella

    Malicious cryptomining is a browser or software-based threat that enables bad actors to secretly use a business' computing power to mine digital currency. Bad actors are drawn to cryptomining because it's an easy and anonymous way for them to generate cash. In this white paper, learn how to protect your organization from cryptomining.

  • 2018 Threat Report

    Sponsored by: CenturyLink

    As cyberthreats proliferate, organizations often seek to find the silver bullet for cybersecurity issues. With so many differing viewpoints of the threat landscape, identifying actionable intelligence is difficult. In this threat report, explore key insights on what the CenturyLink Threat Research Labs sees across the CenturyLink global backbone.

  • Why Your Company Needs Third-Party Security for Office 365

    Sponsored by: Symantec

    Office 365 is a robust platform; however it has some significant security limitations. This Osterman Research Report indicates that many third-party security technologies often present a better alternative to some of the native security capabilities. In this report, learn how third-party vendors can help to bridge Office 365's security gaps.

  • Advanced Threat Prevention Appliance

    Sponsored by: Juniper Networks

    Organizations worldwide face security and productivity challenges every day. Additionally, security teams often fail to recognize and act on critical incidents. In this white paper, learn how the Juniper Networks Advanced Threat Prevention Appliance can protect organizations from cyberattacks.

  • How to Protect Your Business from a Magecart Data Skimming Attack

    Sponsored by: Instart

    Data and credit card skimming attacks are especially worrying for online businesses. Skimming attacks have increased in scale and scope over the last decade, proving that these types of attacks continue to be a persistent security problem. In this white paper, learn why preventing data access is the only true defense against skimming attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.